Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for ClaimUserinfo (0.07 sec)

  1. internal/config/identity/openid/providercfg.go

    }
    
    func newProviderCfgFromConfig(getCfgVal func(cfgName string) string) providerCfg {
    	return providerCfg{
    		DisplayName:        getCfgVal(DisplayName),
    		ClaimName:          getCfgVal(ClaimName),
    		ClaimUserinfo:      getCfgVal(ClaimUserinfo) == config.EnableOn,
    		ClaimPrefix:        getCfgVal(ClaimPrefix),
    		RedirectURI:        getCfgVal(RedirectURI),
    		RedirectURIDynamic: getCfgVal(RedirectURIDynamic) == config.EnableOn,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  2. internal/config/identity/openid/help.go

    			Optional:    true,
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         ClaimUserinfo,
    			Description: `Enable fetching claims from UserInfo Endpoint for authenticated user` + defaultHelpPostfix(ClaimUserinfo),
    			Optional:    true,
    			Type:        "on|off",
    		},
    		config.HelpKV{
    			Key:         KeyCloakRealm,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jun 23 14:45:27 UTC 2023
    - 4.3K bytes
    - Viewed (0)
  3. internal/config/identity/openid/jwt.go

    	pCfg, ok := r.arnProviderCfgsMap[arn]
    	// If claim user info is enabled, get claims from userInfo
    	// and overwrite them with the claims from JWT.
    	if ok && pCfg.ClaimUserinfo {
    		if accessToken == "" {
    			return errors.New("access_token is mandatory if user_info claim is enabled")
    		}
    		uclaims, err := pCfg.UserInfo(ctx, accessToken, r.transport)
    		if err != nil {
    			return err
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 02:46:36 UTC 2024
    - 8.4K bytes
    - Viewed (0)
Back to top